dynk8s-provisioner/terraform
Dustin ff67ddf8bf
dustin/dynk8s-provisioner/pipeline/head There was a failure building this commit Details
tf/asg: Update node template to Fedora 41
2025-07-05 11:06:32 -05:00
..
.gitattributes terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.gitignore terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
.terraform.lock.hcl terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
README.md terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
asg.tf tf/asg: Update node template to Fedora 41 2025-07-05 11:06:32 -05:00
eventbridge.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
iam-policy.json tf/asg: Look up Fedora AMI by attributes 2023-11-13 20:27:50 -06:00
main.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
sns.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00
terraform.tfstate tf/userdata: Configure CRI-O to use crun 2024-11-03 12:34:40 -06:00
userdata.yml tf/userdata: Remove all CNI conflist files 2024-11-19 11:55:29 -06:00
variables.tf terraform: Begin AWS configuration 2022-09-27 12:58:51 -05:00

README.md

Configuring AWS Using Terraform

Prerequisites

The IAM user or role that runs Terraform must have the appropriate permissions. The iam-policy.json file defines a policy that will allow the Terraform to manage all of the necessary resources. Before running Terraform, create an IAM policy and assign it to a user, group, or role. Be sure to replace the AWS account ID in the various target resource names.

To use an IAM role, set the iam_role Terraform variable when executing terraform plan/terraform apply.

Create Resources

Terraform will create all resources automatically:

terraform apply